The computer can potentially be used to monitor most of our actions, thus robbing us of _____

A. tapping
B. privacy
C. back log
D. security
E. None of the above

Submitted by: Muhammad
B. privacy
Submitted by: Muhammad

Read Online Systems Support Manager (MIS) Job Interview Questions And Answers